Follow
Ming-Hsien Tsai
Ming-Hsien Tsai
National Institute of Cyber Security
Verified email at nics.nat.gov.tw
Title
Cited by
Cited by
Year
Automatic numeric abstractions for heap-manipulating programs
S Magill, MH Tsai, P Lee, YK Tsay
Proceedings of the 37th annual ACM SIGPLAN-SIGACT symposium on Principles of …, 2010
1212010
THOR: A Tool for Reasoning about Shape and Arithmetic: Tool Paper
S Magill, MH Tsai, P Lee, YK Tsay
Computer Aided Verification: 20th International Conference, CAV 2008 …, 2008
742008
GOAL: A graphical tool for manipulating Büchi automata and temporal formulae
YK Tsay, YF Chen, MH Tsai, KN Wu, WC Chan
Tools and Algorithms for the Construction and Analysis of Systems: 13th …, 2007
712007
State of B\" uchi Complementation
MH Tsai, S Fogarty, MY Vardi, YK Tsay
Logical Methods in Computer Science 10, 2014
662014
Verifying curve25519 software
YF Chen, CH Hsu, HH Lin, P Schwabe, MH Tsai, BY Wang, BY Yang, ...
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
662014
Automated assume-guarantee reasoning through implicit learning
YF Chen, EM Clarke, A Farzan, MH Tsai, YK Tsay, BY Wang
Computer Aided Verification: 22nd International Conference, CAV 2010 …, 2010
562010
GOAL for games, omega-automata, and logics
MH Tsai, YK Tsay, YS Hwang
Computer Aided Verification: 25th International Conference, CAV 2013, Saint …, 2013
532013
Advanced automata-based algorithms for program termination checking
YF Chen, M Heizmann, O Lengál, Y Li, MH Tsai, A Turrini, L Zhang
Proceedings of the 39th ACM SIGPLAN Conference on Programming Language …, 2018
422018
Complementing semi-deterministic Büchi automata
F Blahoudek, M Heizmann, S Schewe, J Strejček, MH Tsai
Tools and Algorithms for the Construction and Analysis of Systems: 22nd …, 2016
392016
GOAL extended: Towards a research tool for omega automata and temporal logic
YK Tsay, YF Chen, MH Tsai, WC Chan, CJ Luo
Tools and Algorithms for the Construction and Analysis of Systems: 14th …, 2008
322008
PAC learning-based verification and model synthesis
YF Chen, C Hsieh, O Lengál, TJ Lii, MH Tsai, BY Wang, F Wang
Proceedings of the 38th International Conference on Software Engineering …, 2016
262016
Certified verification of algebraic properties on low-level mathematical constructs in cryptographic programs
MH Tsai, BY Wang, BY Yang
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
212017
Büchi store: An open repository of Büchi automata
YK Tsay, MH Tsai, JS Chang, YW Chang
Tools and Algorithms for the Construction and Analysis of Systems: 17th …, 2011
182011
Signed cryptographic program verification with typed cryptoline
YF Fu, J Liu, X Shi, MH Tsai, BY Wang, BY Yang
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
172019
Verifying arithmetic assembly programs in cryptographic primitives (invited talk)
A Polyakov, MH Tsai, BY Wang, BY Yang
29th International Conference on Concurrency Theory (CONCUR 2018), 2018
162018
Formalization of CTL* in Calculus of Inductive Constructions
MH Tsai, BY Wang
Advances in Computer Science-ASIAN 2006. Secure Software and Related Issues …, 2007
162007
Büchi Store: an open repository of-automata
YK Tsay, MH Tsai, JS Chang, YW Chang, CS Liu
International Journal on Software Tools for Technology Transfer 15 (2), 109-123, 2013
122013
Verifying arithmetic in cryptographic c programs
J Liu, X Shi, MH Tsai, BY Wang, BY Yang
2019 34th IEEE/ACM International Conference on Automated Software …, 2019
102019
Comparing Learning Algorithms in Automated Assume-Guarantee Reasoning.
YF Chen, EM Clarke, A Farzan, F He, MH Tsai, YK Tsay, BY Wang, L Zhu
ISoLA (1) 6415, 643-657, 2010
92010
Verifying recursive programs using intraprocedural analyzers
YF Chen, C Hsieh, MH Tsai, BY Wang, F Wang
Static Analysis: 21st International Symposium, SAS 2014, Munich, Germany …, 2014
82014
The system can't perform the operation now. Try again later.
Articles 1–20